Loose lips might sink ships is a propaganda idiom originated during World War II to bring awareness to the hazards that may be caused by careless talk of subject matter that could be potentially vital information to the enemy. As a US Navy veteran, I take this to heart and do my best to protect corporate data no matter how insignificant it may seem. However, social communication sites such as Facebook, Twitter and YouTube provide new avenues of personal sharing in a social context that could have considerable ramifications in a professional context.
The other day I was talking to somebody about the challenges of publicly available communication sites and concerns on how to secure professional content from being openly shared. In many cases employees use the before mentioned sites to communicate internally or externally and often times may be sharing sensitive corporate data on these sites — not with the intent of being malicious, but because it seems like the right way to share information or they want to circumvent IT placed restrictions. He then shared a story with me of a coworker that posted a simple status update to a social site, something to the affect Read More »
In the recent 2012 IBM C Suite Study, leaders said that Collaboration is the number one trait leaders are seeking in their employees, with over 75% calling it critical, and many now see technology as an enabler of collaboration and relationships – those essential connections that fuel creativity and innovation.
At Cisco we believe that people can achieve extraordinary things by working together, and Cisco creates the environments and experience that puts the extraordinary within reach. We are shaping a future
where collaborative work spaces are a blend of physical and virtual,
where the choice of collaboration tool will be Read More »
We could debate whether certain technologies are or are not a commodity, but the fact of the matter is when many enterprises evaluate their technology spend they consider two points: function and cost. This viewpoint yields initial cost savings when technology investements are awarded solely based on price. Unfortunately, a major consideration has been left out when evaluating enterprise technology investments mainly on price. The business risk and increased operating costs associated with multivendor environments, which in the long run may mitigate any initial cost savings.
This message is not new, but what is new is a research paper from Deloitte that details the value of a single-vendor architecture in mitigating business risk and those investing in technology need to consider these risks at the time of evaluation. This paper is a great lead in for the business architecture discussion that will translate to the technical architecture. This paper does two things: Read More »
In the words of Morley Safer from the American news program 60 Minutes, “Stand back all bosses, a new breed of American worker is about to attack everything you hold sacred.” What a nice way to put it Mr. Safer, but to be honest, it sounds a little biased.
Why has there been controversy between Generation Y and the current workforce? It may be due to our abnormal perspectives or the fact that we appreciate when others want our input -- whatever it is, the media has enjoyed writing about our “non-traditional” ways of working. The truth is other generations are now embracing some of our methods: such as communicating through social media and “Bring Your Own Device” (BYOD) because of its convenience and efficiency.
Yes, we may be viewed as discourteous to what the current workforce offers, but considering we represent some of the earliest adopters of new technology, we believe there is always “a next best thing”. Read More »
I attended my second VMworld in San Francisco last week, and I’m seeing a change in the desktop virtualization discussions I’m having with customers. It’s no longer just about the technologies but how it impacts (either positively or negatively) the business process.
There are some business processes common to most companies such as supporting contact center agents and onboarding of contract workers who need only the VDI components but also the communication and collaboration capabilities to do their job--often from remote settings such as their homes.
In fact, a recent analysis based on our customers’ Cisco Virtualization Experience Infrastructure deployments revealed Read More »